“É chegada a hora de inverter o paradigma: mentes que amam e corações que pensam.” Barbara Meyer.

“Se você é neutro em situações de injustiça, você escolhe o lado opressor.” Desmond Tutu.

“Perdoar não é esquecer, isso é Amnésia. Perdoar é se lembrar sem se ferir e sem sofrer. Isso é cura. Por isso é uma decisão, não um sentimento.” Desconhecido.

“Chorar não significa se arrepender, se arrepender é mudar de Atitude.” Desconhecido.

"A educação e o ensino são as mais poderosas armas que podes usar para mudar o mundo ... se podem aprender a odiar, podem ser ensinadas a amar." (N. Mandela).

"As utopias se tornam realidades a partir do momento em que começam a luta por elas." (Maria Lúcia Karam).


“A verdadeira viagem de descobrimento consiste não em procurar novas terras, mas ver com novos olhos”
Marcel Proust


Pesquisar este blog

sexta-feira, 23 de setembro de 2011

Journal of Law and Conflict Resolution

Journal of Law and Conflict Resolution




Dear Colleague,

 

We received a Book Review titledAn Analysis of Identity Theft: Motives, Related Frauds, Techniques, and prevention.



I wish to inquire if you could find time to review the manuscript and send it to us within 7 days.


Please find the abstract below:

ABSTRACT

Identity (ID) theft is unauthorized obtaining to others confidential information in order to misuse it. ID theft is one of the major problems that impose billions of dollars annually on people and businesses across the globe. In 2008 only, 9.9 millions of Americans were victimized which show a 22% increase in compared to 2007.
Analyzing four major factors -political, economic, social, and technological- reveals that social and technological factors are the significant origins of ID theft. Social engineering is a technique for thieves by which social engineers take advantage of people’s behaviors in social networks such as Facebook to steal individuals’ key information.
This report examines different types of frauds that are the major outcomes of ID theft. The frauds as the results of ID theft comprise ID fraud, financial fraud, tax fraud, medical fraud, resume fraud, mortgage fraud, and organized crimes such as money laundering, terrorism, and illegal immigration.
Moreover, the various techniques that thieves use to attack individuals and organizations are discussed. The different techniques are divided to two major ones, physical and technological. Physical techniques include several traditional ways such as mail theft and insider theft. It is crucial for organizations’ managers to know that despite new technology-based techniques, more than 70% of ID theft occurs by insiders. In addition, it will be shown how thieves apply both technology-based techniques such as phishing and social engineering to steal personal information.
Finally several effective prevention techniques will be provided for individuals and organization to protect key data and information against identity theft. Usually, thieves attempt to bypass security systems through human elements. Therefore, the recommendation significantly emphasizes developing individuals’ awareness through public and organizational training. 
Key Words- Identity,Theft,Fraud,Prevention,Personal Information.

Please acknowledge the receipt of this mail.

Best regards,

Prof. Christiena Maria Van Der Bank
Editor,
Journal of Law and Conflict Resolution
ISSN 2006-9804

Nenhum comentário:

Justiça Restaurativa: Marco Teórico, Experiências Brasileiras, Propostas e Direitos Humanos

...

...